Application Security

Application Security | News, how-tos, features, reviews, and videos

secret

How to keep container secrets secret

Keeping secrets secret in container-based applications is complex and challenging, but far from hopeless

Faraday_Blackhat2017
video

Simple tips to keep your devices secure when you travel

CSO security reporters Fahmida Rashid and Steve Ragan share some easy ways to keep your data and devices secure while traveling, even at the Black Hat conference, where active scanning is the norm. (And check out the built-in Faraday...

The dark web's changed
video

How the dark web has gone corporate

Some criminals on the dark web are taking their cues from the practices of corporate IT. Illicit offerings run the gamut from code that buyers have to implement themselves to turnkey solutions and consulting services.

Blackhat_2017
video

How DevOps and cloud will speed up security

Zane Lackey, CSO and co-founder of Signal Sciences, talks with CSO senior writer Fahmida Rashid about how DevOps and cloud can help organizations embed security into their technology structures, enabling business to move faster.

Blackhat_2017
video

Stop blaming users for security misses

Does the message to users about security need to change? Or does IT need to rebuild infrastructure so users can worry less about security? Wendy Nather, principal security strategist at Duo Security, talks with CSO senior writer...

cargo containers

How to think about Docker security

Is Docker secure? To answer that question, we need to look at the entire Docker stack

Arlo Go Netgear

Are VMs more secure than containers?

In theory, virtual machines (VMs) are more secure than containers. In practice, they probably are. It depends on how the VMs are implemented.

security check point sign

DevSecOps: Paradigm shifts are messy, but someone's got to take the lead

Companies that lead with application security have security practitioners willing and able to lead

3 patches

Microsoft kills off security bulletins after several stays

'Disappointing,' says patch expert after concluding the replacement means more work for admins

microsoft stock campus building

Microsoft fixes 45 flaws, including three actively exploited vulnerabilities

Microsoft Patch Tuesday includes fixes for critical flaws in IE, Edge, Office, Windows, and .Net

cio to ceo man with briefcase on skateboard career growth speed blur career path

Silicon Valley weighs speed versus risk in app dev

A panel featuring Atlassian, GitHub, HackerOne, and Rainforest explores how to get successful software projects completed on time without breaking things

security check point sign

Mozilla project keeps compromised apps out of circulation

The Binary Transparency plan would use public certificate technology to guarantee binaries haven't been replaced with malicious counterparts

Security online

Pwn2Own hacking contest ends with two virtual machine escapes

Two teams of researchers managed to win the biggest bounties at this year's Pwn2Own hacking contest by escaping from the VMware Workstation virtual machine and executing code on the host operating system.

20160225 stock mwc ericsson booth security locks

How much are vendor security assurances worth after the CIA leaks?

Software vendors will fix these vulnerabilities, but users should remember that there are always zero-day exploits out there

bug bounty

Why you need a bug bounty program

If you’re ready to deal with the volume of reports, a bug bounty program can help you can find the holes in your system — before attackers do

whisper shh quiet mouth lips men antique vintage secret

Got secrets? Docker Datacenter can help your applications keep them

Docker Datacenter now supports secrets in containerized apps -- API keys, passwords, and encryption keys -- and ensures they are securely stored and transmitted

apple ios

Dozens of iOS apps fail to secure users' data, researcher says

The developers have misconfigured the apps to accept invalid TLS certificates, says the security researcher who detected the app vulnerabilities

machine learning

AI isn't for the good guys alone anymore

Criminals are beginning to use artificial intelligence and machine learning to get around cyberdefenses

heartbleed illustration

That Hearbleed problem may be more pervasive than you think

The 200,000 devices with the OpenSSL Heartbleed vulnerability may include commercial software you are running

defenses against super attackes 1

Cisco scrambling to fix a remote code execution problem in WebEx

There’s no workaround and no final patch for a critical bug that can open up users’ computers to remote code execution attacks

Load More